Communication Networks

Size: px
Start display at page:

Download "Communication Networks"

Transcription

1 Communication Networks Routing and Traffic Management Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto

2 Routing

3 Graph Directed and Undirected

4 Tree Trees T = (V,E)» graph with no cycles» number of edges E = V» any two vertices of the tree are connected by exactly one path A tree T is said to span a graph G = (V,E) (spanning tree) if» T = (V,E ) and E E

5 Shortest Path Trees Graphs and Trees can be weighted» G=(V,E,w)» T=(V, E,w)» w: ER Total cost of a tree T Minimum Spanning Tree T*» algorithms used to compute MST: Prism, Kruskal Shortest Path Tree (SPT) Rooted at Vertex s» tree composed by the» union of the shortest paths between s and each of other vertices of G» Algorithms used to compute SPT: Dijkstra, Bellman-Ford Computer networks use Shortest Path Trees

6 Routing in Datagram Networks

7 Forwarding, Routing Forwarding data plane» directing packet from input to output link» using a forwarding table Routing control plane» computing paths the packets will follow» routers exchanging messages» each router creating its forwarding table 0 destination address routing algorithm local forwarding table header value output link

8 Importance of Routing End-to-end performance» path affects quality of service» delay, throughput, packet loss Usage of network resources» balance traffic over routers and links» avoiding congestion by directing traffic to less-loaded links Transient disruptions» failures, maintenance» limiting packet loss and delay during changes

9 Shortest-Path Routing Path-selection model» Destination-based» Load-insensitive (e.g., static link weights)» Minimum hop count or minimum sum of link weights

10 Shortest-Path Problem Given a network topology with link costs» c(x,y) - link cost from node x to node y» Infinity - if x and y are not direct neighbors Compute the least-cost paths from source u to all nodes p(v) - node predecessor of node v in the path to u 2 u p(v) 4 3 v

11 Dijkstra s Shortest-Path Algorithm Iterative algorithm» After k iterations known least-cost paths to k nodes S set of nodes whose least-cost path is known» Initially, S={u}, where u is the source node» Add one node to S in each iteration D(v) current cost of path from source to node v» Initially D(v)=c(u,v) for all nodes v adjacent to u D(v)= for all other nodes v» Continually update D(v) when shorter paths are learned

12 Dijsktra s Algorithm Initialization: 2 S = {u} 3 for all nodes v 4 if v adjacent to u { 5 D(v) = c(u,v) } 6 else D(v) = 7 8 Loop 9 find node w not in S with the smallest D(w) 0 add w to S update D(v) for all v adjacent to w and not in S: 2 D(v) = min{d(v), D(w) + c(w,v)} 3 until all nodes in S

13 Dijkstra s Algorithm - Example

14 Dijkstra s Algorithm - Example

15 Shortest-Path Tree Shortest-path tree from u v 2 y 3 x 4 u 2 5 t w 4 3 s Forwarding table at u link z v (u,v) w (u,w) x (u,w) y (u,v) z (u,v) s (u,w) t (u,w)

16 Link-State Routing Each router keeps track of its incident links» link up, link down» cost on the link Each router broadcasts the link state every router gets a complete view of the graph Each router runs Dijkstra s algorithm, to» compute the shortest paths» construct the forwarding table Example protocols» Open Shortest Path First (OSPF)» Intermediate System Intermediate System (IS-IS)

17 Detection of Topology Changes Beacons generated by routers on links» Periodic hello messages in both directions» few missed hellos link failure hello 7

18 Broadcasting the Link State How to Flood the link state?» every node sends link-state information through adjacent links» next nodes forward that info to all links except the one where the information arrived X A C B D (a) X A C B D (b) When to initiate flooding?» Topology change link or node failure/recovery link cost change» Periodically refresh link-state information typically 30 minutes X A C B D (c) X A C B D (d)

19 Scaling Link-State Routing Overhead of link-state routing» flooding link-state packets throughout the network» running Dijkstra s shortest-path algorithm Introducing hierarchy through areas Area Area 2 area border router Area 0 Area 3 Area 4

20 Bellman-Ford Algorithm Define distances at each node x» d x (y) = cost of least-cost path from x to y Update distances based on neighbors» d x (y) = min {c(x,v) + d v (y)} over all neighbors v u 3 2 v w 4 2 x 5 s 3 4 y t z d u (z) = min{c(u,v) + d v (z), c(u,w) + d w (z)}

21 Distance Vector Algorithm c(x,v) = cost for direct link from x to v node x maintains costs of direct links c(x,v) D x (y) = estimate of least cost from x to y node x maintains distance vector D x = [D x (y): y є N ] Node x maintains also its neighbors distance vectors for each neighbor v, x maintains D v = [D v (y): y є N ] Each node v periodically sends D v to its neighbors» and neighbors update their own distance vectors» D x (y) min v {c(x,v) + D v (y)} for each node y N Over time, the distance vector D x converges

22 Distance Vector Algorithm Iterative, asynchronous each local iteration caused by: local link cost change distance vector update message from neighbor Distributed» node notifies neighbors only when its DV changes Each node: wait for (change in local link cost or message from neighbor) recompute estimates if DV to any destination has changed, notify neighbors Neighbors then notify their neighbors, if necessary

23 Distance Vector Example - Step 0 Optimum -hop paths Table for A Dst Cst Hop Table for B Dst Cst Hop E 3 C A 0 A B 4 B C D E 2 E F 6 F A 4 A B 0 B C D 3 D E F F 2 A 6 4 F B 3 D Table for C Table for D Table for E Table for F Dst Cst Hop Dst Cst Hop Dst Cst Hop Dst Cst Hop A A A 2 A A 6 A B B 3 B B B B C 0 C C C C C C D D D 0 D D D E E E 0 E E 3 E F F F F 3 F F 0 F

24 Distance Vector Example - Step Optimum 2-hop paths Table for A Dst Cst Hop Table for B Dst Cst Hop E 3 C A 0 A B 4 B C 7 F D 7 B E 2 E F 5 E A 4 A B 0 B C 2 F D 3 D E 4 F F F 2 A 6 4 F B 3 D Table for C Table for D Table for E Table for F Dst Cst Hop Dst Cst Hop Dst Cst Hop Dst Cst Hop A 7 F A 7 B A 2 A A 5 B B 2 F B 3 B B 4 F B B C 0 C C C C 4 F C C D D D 0 D D D 2 C E 4 F E E 0 E E 3 E F F F 2 C F 3 F F 0 F

25 Distance Vector Example - Step 2 Optimum 3-hop paths Table for A Dst Cst Hop Table for B Dst Cst Hop E 3 C A 0 A B 4 B C 6 E D 7 B E 2 E F 5 E A 4 A B 0 B C 2 F D 3 D E 4 F F F 2 A 6 4 F B 3 D Table for C Table for D Table for E Table for F Dst Cst Hop Dst Cst Hop Dst Cst Hop Dst Cst Hop A 6 F A 7 B A 2 A A 5 B B 2 F B 3 B B 4 F B B C 0 C C C C 4 F C C D D D 0 D D 5 F D 2 C E 4 F E 5 C E 0 E E 3 E F F F 2 C F 3 F F 0 F

26 Maximum Flow of a Network

27 Flow Network Model Flow network» source s» sink t» nodes a, b and c Edges are labeled with capacities» (e.g. bit/s) Communication networks are not flow networks» they are queue networks» flow networks enable to determine limit values

28 Maximum Capacity of a Flow Network Max-flow min-cut theorem» maximum amount of flow transferable through a network» equals minimum value among all simple cuts of the network Cut split of the nodes V into two disjoint sets S and T» S T = V» there are 2 V 2 possible cuts Capacity of cut (S, T):

29 Max-flow Min-cut - Example possible cuts Maximum flow = 0

30 Traffic Management Packet Level, Flow Level

31 Time Scales Packet Level» Queueing & scheduling at multiplexing points» Determines performance offered to packets over a short time scale (ms) Flow Level» Management of traffic flows & resource allocation ( ms to s)» Matching traffic flows to available resources Flow-Aggregate Level» Routing of aggregate traffic flows across the network (min to days)» Efficient utilization of resources; meeting of service levels» Traffic Engineering

32 End-to-End QoS Packet traversing network» encounters delay and possible loss» at various multiplexing points Packet buffer 2 N N End-to-end performance is the accumulation of per-hop performances

33 Quality of Service and Scheduling End-to-End QoS» Packet delay, packet loss» Performance level can be engineered by Buffer control, bandwidth control Admission control of traffic entering network Scheduling Concepts: fairness, priority Fair Queueing» Weighted Fair Queuing (WFQ)» Packetized Generalized Processor Sharing (PGPS) Guaranteed Service: WFQ, Rate-control

34 FIFO Queueing Arriving packets Packet discard when full Packet buffer Transmission link All packet flows share the same buffer Transmission Discipline: First-In, First-Out Buffering Discipline» Discard arriving packets if buffer is full» Random discard» Discard head-of-line (i.e. oldest, packet)

35 FIFO Queueing Cannot provide differential QoS to different packet flows Statistical delay guarantees via load control» Restrict number of flows allowed (connection admission control)» Difficult to determine performance delivered Finite buffer determines a maximum possible delay Buffer size determines loss probability» Depends on arrival & packet length statistics

36 FIFO Queueing with Discard Priority (a) Arriving packets Packet discard when full Packet buffer Transmission link (b) Arriving packets Class discard when full Packet buffer Class 2 discard when threshold exceeded Transmission link

37 Head Of Line (HOL) Priority Queueing Packet discard when full High-priority packets Transmission link Low-priority packets Packet discard when full When high-priority queue empty High priority queue serviced until empty High priority queue has lower waiting time Buffers can be dimensioned for different loss probabilities Surge in high priority queue can cause low priority queue to saturate

38 Delay HOL Priority Features Provides differential QoS High-priority classes can» get all the bandwidth» starve lower priority classes Per-class loads

39 Earliest Due Date Scheduling Arriving packets Tagging unit Sorted packet buffer Packet discard when full Transmission link Queue in order of due date» packets requiring low delay get earlier due date» packets without delay get indefinite or very long due dates

40 Fair Queueing / Generalized Processor Sharing Packet flow Packet flow 2 Approximated bit-level round robin service C bit/s Packet flow n Transmission link Each flow has its own logical queue» prevents hogging; allows differential loss probabilities C bit/s allocated equally among non-empty queues» transmission rate = C / n(t), where n(t)= # non-empty queues Idealized system assumes fluid flow from queues Implementation requires approximation» simulate fluid system; sort packets according to completion time in ideal system

41 Fluid Flow System Buffer at t=0 Buffer 2 at t=0 0 2 t Fluid-flow system: both packets served at rate /2 Both packets complete service at t = 2 Packet from buffer 2 waiting Packet-by-packet system: buffer served first at rate ; then buffer 2 served at rate. Packet from buffer 2 being served Packet from buffer being served 0 2 t

42 Fluid Flow Buffer at t=0 Buffer 2 at t=0 2 Fluid-flow system: both packets served at rate /2 Packet from buffer 2 served at rate t Packet from buffer 2 waiting Packet-by-packet fair queueing: buffer 2 served at rate Packet from buffer served at rate t

43 Fluid Flow with Weights Buffer at t=0 /4 Fluid-flow system: packet from buffer served at rate /4; Buffer 2 3/4 at t=0 Packet from buffer served at rate Packet from buffer 2 served at rate 3/4 0 2 t Packet from buffer waiting Packet-by-packet weighted fair queueing: buffer 2 served first at rate ; then buffer served at rate Packet from buffer served at rate Packet from buffer 2 served at rate 0 2 t

44 Packetized GPS/WFQ Arriving packets Tagging unit Sorted packet buffer Packet discard when full Transmission link Compute packet completion time in ideal system» add tag to packet» sort packet in queue according to tag» serve according to HOL

45 Bit-by-Bit Fair Queueing Assume n flows, n queues round = cycle serving all n queues If each queue gets bit per cycle Round number = number of cycles of service that have been completed rounds Current Round # If packet arrives to idle queue: Finishing time = round number + packet size in bits If packet arrives to active queue: Finishing time = finishing time of last packet in queue + packet size

46 Number of rounds = Number of bit transmission opportunities Rounds Buffer Buffer 2 Buffer n Packet completes transmission k rounds later Packet of length k bits begins transmission in this time Differential Service» If a traffic flow is to receive twice as much bandwidth as a regular flow, then its packet completion time would be half

47 Computing the Finishing Time F(i,k,t) = finish time of kth packet that arrives at time t to flow i P(i,k,t) = size of kth packet that arrives at time t to flow i R(t) = round number at time t rounds Generalize so R(t) continuous, not discrete R(t) grows at rate inversely proportional to n(t) Fair Queueing:(take care of both idle and active cases) F(i,k,t) = max{f(i,k-,t), R(t)} + P(i,k,t) Weighted Fair Queueing: F(i,k,t) = max{f(i,k-,t), R(t)} + P(i,k,t)/w i

48 Traffic Management at the Flow Level

49 Network Congestion Congestion 3 6 Congestion occurs when a surge of traffic overloads network resources Congestion Control» Preventive: Scheduling & Reservations» Reactive: Detect & Discard

50 Throughput Ideal Congestion Control Ideal effect of congestion control: resources used efficiently up to capacity available Controlled Uncontrolled Offered load

51 Congestion Control Open loop Closed loop

52 Open-Loop Control Network performance is guaranteed to all traffic flows that have been admitted into the network Initially for connection-oriented networks Key Mechanisms» Admission Control» Policing» Traffic Shaping» Traffic Scheduling

53 Bit/s Admission Control Flow negotiates contract with network Peak rate Average rate Specify requirements» Offered traffic (traffic contract) Peak, Average, Min Bit rate Maximum burst size» QoS required Delay, Loss Typical bit rate demanded by a variable bit rate information source Time Network computes resources needed» Effective bandwidth If flow is accepted: network allocates resources to ensure QoS as long as source conforms to contract

54 Policing Network monitors traffic flow continuously to ensure it meets traffic contract When a packet violates the contract network can discard or tag the packet giving it lower priority If congestion occurs tagged packets are discarded first Leaky Bucket Algorithm» commonly used policing mechanism» Bucket has specified leak rate for average contracted rate: r depth to accommodate variations in arrival rate: B» Arriving packet is conforming if it does not result in bucket overflow

55 Leaky Bucket Algorithm Leaky Bucket algorithm can be used to police arrival rate of a packet stream water poured irregularly leaky bucket water drains at a constant rate Leak rate corresponds to longterm rate Bucket depth corresponds to maximum allowable burst arrival packet per unit time Assume constant-length packet Let X = bucket content at last conforming packet arrival Let t a last conforming packet arrival time = depletion in bucket

56 Leaky Bucket Example I = 4, B=0, L=B-I=6 Packet arrival Nonconforming Time B Bucket content I * * * * * * * * * Time Non-conforming packets not allowed into bucket, hence not included in calculations

57 Leaky Bucket Algorithm Arrival of a packet at time t a X = X - (t a - LCT) Depletion rate: packet per unit time Current bucket content X < 0? Interarrival time Yes L=B-I I = increment per arrival, nominal interarrival time Non-empty No X = 0 Nonconforming packet arriving packet would cause overflow Yes X > L? No X = X + I LCT = t a conforming packet empty X = value of the leaky bucket counter X = auxiliary variable LCT = last conformance time conforming packet

58 Dual Leaky Bucket Dual leaky bucket to police PCR, SCR, and MBS: Incoming traffic Leaky bucket SCR and MBS Tagged or dropped Untagged traffic Leaky bucket 2 PCR and CDVT Tagged or dropped Untagged traffic PCR = peak cell rate CDVT = cell delay variation tolerance SCR = sustainable cell rate MBS = maximum burst size

59 Traffic Shaping Traffic shaping Policing Traffic shaping Policing Network A Network B Network C Networks police the incoming traffic flow Traffic shaping is used to ensure that a packet stream conforms to specific parameters Networks can shape their traffic prior to passing it to another network

60 Leaky Bucket Traffic Shaper Incoming traffic Size N Server Shaped traffic Packet Buffer incoming packets Play out periodically to conform to parameters Surges in arrivals are buffered & smoothed out Possible packet loss due to buffer overflow Too restrictive, since» conforming traffic does not need to be completely smooth

61 Leaky Bucket Traffic Shaper Controls the maximum instantaneous rate (leak rate) r of a flow» accepts bursty traffic on its input» eliminates bursts on the output While the buffer is not empty» the output flow is periodic (T = / r),» with rate r Maximum accepted Burst Size» MBS = B * R / (R r) for R > r

62 Token Bucket Traffic Shaper An incoming packet must have sufficient tokens before admission into the network Token Tokens arrive periodically ( r ) Size b Incoming traffic Size N Server Shaped traffic Packet Token rate regulates transfer of packets If sufficient tokens available, packets enter network without delay b determines how much burstiness allowed into the network

63 Token Bucket Shaping Effect The token bucket constrains the traffic from a source to be limited to b + r t bits in an interval of length t b bytes instantly b + r t r bytes/second t

64 Packet transfer with Delay Guarantees (a) A(t) = b+rt Token Shaper Bit rate > R > r e.g., using WFQ R(t) No backlog of packets R(t) (b) Buffer occupancy at 0 b Assume fluid flow for information Token bucket shaper allows burst of b then r byte/s» Since R>r, buffer never greater than b byte» Thus, mux < b/r Rate into second mux is r<r, so bytes are never delayed b R 2 b R - r Buffer occupancy at 2 t Empty t

65 Delay Bounds with WFQ / PGPS Assume» traffic shaped (token bucket) to parameters b & r» schedulers give flow at least rate R>r» H hop path» m is maximum packet size for the given flow» M maximum packet size in the network» R j transmission rate in jth hop Maximum end-to-end delay experienced by a packet from flow i is D b R ( H ) m R H j M R j

66 Scheduling for Guaranteed Service Suppose guaranteed bounds on end-to-end delay across the network are to be provided. Then» Call admission control procedure is required to allocate resources & set schedulers» Traffic flows from sources must be shaped/regulated so that they do not exceed their allocated resources Strict delay bounds can be met

67 Current View of Router Functions Routing Agent Reservation Agent Mgmt. Agent Admission Control [Routing database] [Traffic control database] Input driver Classifier Internet forwarder Pkt. scheduler Output driver

68 Closed-Loop Control Congestion control» Feedback information to regulate flow from sources into network» Based on buffer content, link utilization,» Examples: TCP at transport layer; congestion control at ATM level End-to-end vs. Hop-by-hop» Delay in effecting control Implicit vs. Explicit Feedback» Source deduces congestion from observed behavior» Routers/switches generate messages alerting to congestion

69 End-to-End vs. Hop-by-Hop Congestion Control Source Packet flow Destination (a) Source Destination (b) Feedback information

70 TCP Congestion Control End-to-end, Implicit Main idea» each source determines its capacity» based on criteria enabling flow fairness efficiency Received ACKs regulate packet transmission they are the source clock

71 Additive Increase/Multiplicative Decrease Changes in channel capacity adjustment of transmission rate New variable per connection CongestionWindow Bitrate (byte/s) CongestionWindow/RTT Objective» If network congestion decreases CongestionWindow increases» If network congestion increases CongestionWindow decreases

72 Additive Increase/Multiplicative Decrease How does the source know if/when the network is in congestion? By timeout!» wired link low BER low FER» timeout occurrence loss of packet» packet loss buffer in router is full congestion

73 Additive Increase/Multiplicative Decrease Algorithm» increases CongestionWindow by segment for each RTT (Round Trip Time) additive increase Source Destination» divide CongestionWindow by 2 when there is a packet loss multiplicative decrease

74 KB Additive Increase/Multiplicative Decrease Saw-tooth behavior T ime (seconds)

75 Slow Start Objective» determine the available capacity Source Destination Behaviour» start by CongestionWindow = segment» double CongestionWindow by each RTT

76 Fast Retransmission, Fast Recovery Problem» if TCP timeout is large long inactivity period Sender Packet Packet 2 Packet 3 Packet 4 Receiver ACK ACK 2 Packet 5 ACK 2 Solution Packet 6 ACK 2» fast retransmission ACK 2 after 3 repeated ACKs Retransmit packet 3 ACK 6

77 Source Destination TCP Slow Start Slow Start» Sender starts with CongestionWindow=sgm» Doubles CongestionWindow by RTT When a segment loss is detected, by timeout» threshold = ½ congestionwindow(*)» CongestionWindow= sgm (router gets time to empty queues)» Lost packet is retransmitted» Slow start while congwindow<threshold» Then Congestion Avoidance phase (*) - in fact FlightSize, the amount of outstanding data

78 KB Congestion Avoidance Congestion Avoidance (additive increase)» increments congestionwindow by sgm, per RTT Detection of segment loss, by reception of 3 duplicated ACKs» Assumes packet is lost, Not by severe congestion, because following segments have arrived» Retransmits lost packet» CongestionWindow=CongestionWindow/2» Congestion Avoidance phase Source Destination T ime (seconds) 0.0

79 Desirable Bandwidth Allocation Max-min fairness Fair use gives bandwidth to all flows (no starvation)» Max-min fairness gives equal shares of bottleneck Bottleneck link max-min fair: maximizes the minimum bandwidth flows get

80 Desirable Bandwidth Allocation Bitrates along the time Bitrates must converge quickly when traffic patterns change Flow slows quickly when Flow 2 starts Flow speeds up quickly when Flow 2 stops CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 20

81 Homework Review slides Read from Leon-Garcia» Chapter 7 Packet Switching Networks Read from Tanenbaum» TCP Congestion control For formal analysis of these topics» Routing: Bertsekas & Gallager, Data Networks» Traffic and resource management: Anurag Kumar, D. Manjunath, Joy Kuri, Communication Networking - An Analytical Approach, Elsevier, 2004

Redes de Computadores. Shortest Paths in Networks

Redes de Computadores. Shortest Paths in Networks Redes de Computadores Shortest Paths in Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto » What is a graph?» What is a spanning tree?» What is a shortest path tree?» How are

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

Congestion Control Open Loop

Congestion Control Open Loop Congestion Control Open Loop Muhammad Jaseemuddin Dept. of Electrical & Computer Engineering Ryerson University Toronto, Canada References 1. A. Leon-Garcia and I. Widjaja, Communication Networks: Fundamental

More information

Congestion in Data Networks. Congestion in Data Networks

Congestion in Data Networks. Congestion in Data Networks Congestion in Data Networks CS420/520 Axel Krings 1 Congestion in Data Networks What is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet

More information

What Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues

What Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues 168 430 Computer Networks Chapter 13 Congestion in Data Networks What Is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet handling capacity

More information

Link-State Routing OSPF

Link-State Routing OSPF CE Computer Networks Link-State Routing OSPF Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer

More information

Lecture 4 Wide Area Networks - Congestion in Data Networks

Lecture 4 Wide Area Networks - Congestion in Data Networks DATA AND COMPUTER COMMUNICATIONS Lecture 4 Wide Area Networks - Congestion in Data Networks Mei Yang Based on Lecture slides by William Stallings 1 WHAT IS CONGESTION? congestion occurs when the number

More information

CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL

CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL Dr. Bhargavi Goswami, Associate Professor head, Department of Computer Science, Garden City College Bangalore. PACKET SWITCHED NETWORKS Transfer blocks

More information

Resource allocation in networks. Resource Allocation in Networks. Resource allocation

Resource allocation in networks. Resource Allocation in Networks. Resource allocation Resource allocation in networks Resource Allocation in Networks Very much like a resource allocation problem in operating systems How is it different? Resources and jobs are different Resources are buffers

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive

More information

Flow Control. Flow control problem. Other considerations. Where?

Flow Control. Flow control problem. Other considerations. Where? Flow control problem Flow Control An Engineering Approach to Computer Networking Consider file transfer Sender sends a stream of packets representing fragments of a file Sender should try to match rate

More information

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion

More information

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control Chapter 12 Congestion in Data Networks Effect of Congestion Control Ideal Performance Practical Performance Congestion Control Mechanisms Backpressure Choke Packet Implicit Congestion Signaling Explicit

More information

Common network/protocol functions

Common network/protocol functions Common network/protocol functions Goals: Identify, study common architectural components, protocol mechanisms Synthesis: big picture Depth: important topics not covered in introductory courses Overview:

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks QoS in IP networks Prof. Andrzej Duda duda@imag.fr Contents QoS principles Traffic shaping leaky bucket token bucket Scheduling FIFO Fair queueing RED IntServ DiffServ http://duda.imag.fr

More information

ADVANCED COMPUTER NETWORKS

ADVANCED COMPUTER NETWORKS ADVANCED COMPUTER NETWORKS Congestion Control and Avoidance 1 Lecture-6 Instructor : Mazhar Hussain CONGESTION CONTROL When one part of the subnet (e.g. one or more routers in an area) becomes overloaded,

More information

RSVP 1. Resource Control and Reservation

RSVP 1. Resource Control and Reservation RSVP 1 Resource Control and Reservation RSVP 2 Resource Control and Reservation policing: hold sources to committed resources scheduling: isolate flows, guarantees resource reservation: establish flows

More information

Resource Control and Reservation

Resource Control and Reservation 1 Resource Control and Reservation Resource Control and Reservation policing: hold sources to committed resources scheduling: isolate flows, guarantees resource reservation: establish flows 2 Usage parameter

More information

Computer Networking. Queue Management and Quality of Service (QOS)

Computer Networking. Queue Management and Quality of Service (QOS) Computer Networking Queue Management and Quality of Service (QOS) Outline Previously:TCP flow control Congestion sources and collapse Congestion control basics - Routers 2 Internet Pipes? How should you

More information

Outline EEC-682/782 Computer Networks I. Midterm 1 Statistics. Midterm 1 Statistics. High 99, Low 34, Average 66

Outline EEC-682/782 Computer Networks I. Midterm 1 Statistics. Midterm 1 Statistics. High 99, Low 34, Average 66 Outline EEC-682/782 Computer Networks I Lecture 12 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser

More information

ATM Quality of Service (QoS)

ATM Quality of Service (QoS) ATM Quality of Service (QoS) Traffic/Service Classes, Call Admission Control Usage Parameter Control, ABR Agenda Introduction Service Classes and Traffic Attributes Traffic Control Flow Control Special

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

Multiplexing. Common network/protocol functions. Multiplexing: Sharing resource(s) among users of the resource.

Multiplexing. Common network/protocol functions. Multiplexing: Sharing resource(s) among users of the resource. Common network/protocol functions Goals: Identify, study common architectural components, protocol mechanisms Synthesis: big picture Depth: Important topics not covered in introductory courses Overview:

More information

Congestion Control in Communication Networks

Congestion Control in Communication Networks Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below

More information

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services Overview 15-441 15-441 Computer Networking 15-641 Lecture 19 Queue Management and Quality of Service Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 What is QoS? Queuing discipline and scheduling

More information

Congestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources

Congestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources Congestion Source 1 Source 2 10-Mbps Ethernet 100-Mbps FDDI Router 1.5-Mbps T1 link Destination Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets

More information

Quality of Service (QoS)

Quality of Service (QoS) CEN445 Network Protocols and Algorithms Chapter 5 Network Layer 5.4 Quality of Service Dr. Mostafa Hassan Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud

More information

"Filling up an old bath with holes in it, indeed. Who would be such a fool?" "A sum it is, girl," my father said. "A sum. A problem for the mind.

Filling up an old bath with holes in it, indeed. Who would be such a fool? A sum it is, girl, my father said. A sum. A problem for the mind. We were doing very well, up to the kind of sum when a bath is filling at the rate of so many gallons and two holes are letting the water out, and please to say how long it will take to fill the bath, when

More information

Intermediate Traffic Management

Intermediate Traffic Management Intermediate Traffic Management This presentation has been generated by the ATM Forum for the purpose of educating the public on ATM Technology and the ATM Forum s activities. This presentation is the

More information

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router Scheduling algorithms Scheduling Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Scheduling: choose a packet to transmit over a link among all

More information

Kommunikationssysteme [KS]

Kommunikationssysteme [KS] Kommunikationssysteme [KS] Dr.-Ing. Falko Dressler Computer Networks and Communication Systems Department of Computer Sciences University of Erlangen-Nürnberg http://www7.informatik.uni-erlangen.de/~dressler/

More information

Chapter 24 Congestion Control and Quality of Service 24.1

Chapter 24 Congestion Control and Quality of Service 24.1 Chapter 24 Congestion Control and Quality of Service 24.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 24-1 DATA TRAFFIC The main focus of congestion control

More information

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer

More information

Traffic Access Control. Hamid R. Rabiee Mostafa Salehi, Fatemeh Dabiran, Hoda Ayatollahi Spring 2011

Traffic Access Control. Hamid R. Rabiee Mostafa Salehi, Fatemeh Dabiran, Hoda Ayatollahi Spring 2011 Traffic Access Control Hamid R. Rabiee Mostafa Salehi, Fatemeh Dabiran, Hoda Ayatollahi Spring 2011 Outlines Traffic Access Control Definition Traffic Shaping Traffic Policing The Leaky Bucket The Token

More information

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies CSCD 433/533 Priority Traffic Advanced Networks Spring 2016 Lecture 21 Congestion Control and Queuing Strategies 1 Topics Congestion Control and Resource Allocation Flows Types of Mechanisms Evaluation

More information

Network Layer Enhancements

Network Layer Enhancements Network Layer Enhancements EECS 122: Lecture 14 Department of Electrical Engineering and Computer Sciences University of California Berkeley Today We have studied the network layer mechanisms that enable

More information

Frame Relay. Frame Relay: characteristics

Frame Relay. Frame Relay: characteristics Frame Relay Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network management and QoS provisioning - 1 Frame Relay: characteristics Packet switching

More information

DATA COMMUNICATOIN NETWORKING

DATA COMMUNICATOIN NETWORKING DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book & Slides: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks

More information

Lecture 24: Scheduling and QoS

Lecture 24: Scheduling and QoS Lecture 24: Scheduling and QoS CSE 123: Computer Networks Alex C. Snoeren HW 4 due Wednesday Lecture 24 Overview Scheduling (Weighted) Fair Queuing Quality of Service basics Integrated Services Differentiated

More information

Episode 5. Scheduling and Traffic Management

Episode 5. Scheduling and Traffic Management Episode 5. Scheduling and Traffic Management Part 2 Baochun Li Department of Electrical and Computer Engineering University of Toronto Keshav Chapter 9.1, 9.2, 9.3, 9.4, 9.5.1, 13.3.4 ECE 1771: Quality

More information

Link State Rou.ng Reading: Sec.ons 4.2 and 4.3.4

Link State Rou.ng Reading: Sec.ons 4.2 and 4.3.4 Link State Rou.ng Reading: Sec.ons. and.. COS 6: Computer Networks Spring 0 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring/cos6/ Inside a router Goals of Today s Lecture Control plane:

More information

Queuing. Congestion Control and Resource Allocation. Resource Allocation Evaluation Criteria. Resource allocation Drop disciplines Queuing disciplines

Queuing. Congestion Control and Resource Allocation. Resource Allocation Evaluation Criteria. Resource allocation Drop disciplines Queuing disciplines Resource allocation Drop disciplines Queuing disciplines Queuing 1 Congestion Control and Resource Allocation Handle congestion if and when it happens TCP Congestion Control Allocate resources to avoid

More information

CS244a: An Introduction to Computer Networks

CS244a: An Introduction to Computer Networks Name: Student ID #: Campus/SITN-Local/SITN-Remote? MC MC Long 18 19 TOTAL /20 /20 CS244a: An Introduction to Computer Networks Final Exam: Thursday February 16th, 2000 You are allowed 2 hours to complete

More information

Internet Services & Protocols. Quality of Service Architecture

Internet Services & Protocols. Quality of Service Architecture Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Quality of Service Architecture Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail:

More information

Network Support for Multimedia

Network Support for Multimedia Network Support for Multimedia Daniel Zappala CS 460 Computer Networking Brigham Young University Network Support for Multimedia 2/33 make the best of best effort use application-level techniques use CDNs

More information

Congestion Control. Queuing Discipline Reacting to Congestion Avoiding Congestion. Issues

Congestion Control. Queuing Discipline Reacting to Congestion Avoiding Congestion. Issues Congestion Control Outline Queuing Discipline Reacting to Congestion Avoiding Congestion Issues Two sides of the same coin pre-allocate resources to avoid congestion (e.g. telephone networks) control congestion

More information

Network Model for Delay-Sensitive Traffic

Network Model for Delay-Sensitive Traffic Traffic Scheduling Network Model for Delay-Sensitive Traffic Source Switch Switch Destination Flow Shaper Policer (optional) Scheduler + optional shaper Policer (optional) Scheduler + optional shaper cfla.

More information

Lecture Outline. Bag of Tricks

Lecture Outline. Bag of Tricks Lecture Outline TELE302 Network Design Lecture 3 - Quality of Service Design 1 Jeremiah Deng Information Science / Telecommunications Programme University of Otago July 15, 2013 2 Jeremiah Deng (Information

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

ETSF05/ETSF10 Internet Protocols. Performance & QoS Congestion Control

ETSF05/ETSF10 Internet Protocols. Performance & QoS Congestion Control ETSF05/ETSF10 Internet Protocols Performance & QoS Congestion Control Quality of Service (QoS) Maintaining a functioning network Meeting applications demands User s demands = QoE (Quality of Experience)

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 01 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Homework #4 Due Thursday, Nov 1 st Project # Due Tuesday, Nov 6 th Later this semester: Homework #5 Due Thursday,

More information

Project Computer Networking. Resource Management Approaches. Start EARLY Tomorrow s recitation. Lecture 20 Queue Management and QoS

Project Computer Networking. Resource Management Approaches. Start EARLY Tomorrow s recitation. Lecture 20 Queue Management and QoS Project 3 15-441 Computer Networking Start EARLY Tomorrow s recitation Lecture 20 Queue Management and QoS Lecture 20: QOS (c) CMU, 2005-10 2 Traffic and Resource Management Resource Management Approaches

More information

Lecture 5: Performance Analysis I

Lecture 5: Performance Analysis I CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview

More information

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question

More information

Overview. Lecture 22 Queue Management and Quality of Service (QoS) Queuing Disciplines. Typical Internet Queuing. FIFO + Drop tail Problems

Overview. Lecture 22 Queue Management and Quality of Service (QoS) Queuing Disciplines. Typical Internet Queuing. FIFO + Drop tail Problems Lecture 22 Queue Management and Quality of Service (QoS) Overview Queue management & RED Fair queuing Khaled Harras School of Computer Science niversity 15 441 Computer Networks Based on slides from previous

More information

TELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling)

TELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling) TELE9751 - Switching Systems and Architecture Assignment Week 10 Lecture Summary - Traffic Management (including scheduling) Student Name and zid: Akshada Umesh Lalaye - z5140576 Lecturer: Dr. Tim Moors

More information

ETSF05/ETSF10 Internet Protocols. Performance & QoS Congestion Control

ETSF05/ETSF10 Internet Protocols. Performance & QoS Congestion Control ETSF05/ETSF10 Internet Protocols Performance & QoS Congestion Control Quality of Service (QoS) Maintaining a functioning network Meeting applications demands User s demands = QoE (Quality of Experience)

More information

Advanced Lab in Computer Communications Meeting 6 QoS. Instructor: Tom Mahler

Advanced Lab in Computer Communications Meeting 6 QoS. Instructor: Tom Mahler Advanced Lab in Computer Communications Meeting 6 QoS Instructor: Tom Mahler Motivation Internet provides only single class of best-effort service. Some applications can be elastic. Tolerate delays and

More information

CS CS COMPUTER NETWORKS CS CS CHAPTER 6. CHAPTER 6 Congestion Control

CS CS COMPUTER NETWORKS CS CS CHAPTER 6. CHAPTER 6 Congestion Control COMPUTER NETWORKS CS 45201 CS 55201 CHAPTER 6 Congestion Control COMPUTER NETWORKS CS 45201 CS 55201 CHAPTER 6 Congestion Control P. Farrell and H. Peyravi Department of Computer Science Kent State University

More information

Prof. Dr. Abdulmotaleb El Saddik. site.uottawa.ca mcrlab.uottawa.ca. Quality of Media vs. Quality of Service

Prof. Dr. Abdulmotaleb El Saddik. site.uottawa.ca mcrlab.uottawa.ca. Quality of Media vs. Quality of Service Multimedia Communications Multimedia Technologies & Applications Prof. Dr. Abdulmotaleb El Saddik Multimedia Communications Research Laboratory School of Information Technology and Engineering University

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 Multimedia networking:

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Lecture 14: Congestion Control"

Lecture 14: Congestion Control Lecture 14: Congestion Control" CSE 222A: Computer Communication Networks George Porter Thanks: Amin Vahdat, Dina Katabi and Alex C. Snoeren Lecture 14 Overview" TCP congestion control review Dukkipati

More information

QUALITY of SERVICE. Introduction

QUALITY of SERVICE. Introduction QUALITY of SERVICE Introduction There are applications (and customers) that demand stronger performance guarantees from the network than the best that could be done under the circumstances. Multimedia

More information

Lecture 14: Congestion Control"

Lecture 14: Congestion Control Lecture 14: Congestion Control" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Amin Vahdat, Dina Katabi Lecture 14 Overview" TCP congestion control review XCP Overview 2 Congestion Control

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Episode 5. Scheduling and Traffic Management

Episode 5. Scheduling and Traffic Management Episode 5. Scheduling and Traffic Management Part 3 Baochun Li Department of Electrical and Computer Engineering University of Toronto Outline What is scheduling? Why do we need it? Requirements of a scheduling

More information

Lecture 22: Buffering & Scheduling. CSE 123: Computer Networks Alex C. Snoeren

Lecture 22: Buffering & Scheduling. CSE 123: Computer Networks Alex C. Snoeren Lecture 22: Buffering & Scheduling CSE 123: Computer Networks Alex C. Snoeren Lecture 23 Overview Buffer Management FIFO RED Traffic Policing/Scheduling 2 Key Router Challenges Buffer management: which

More information

Link State Rou.ng Reading: Sec.ons 4.2 and 4.3.4

Link State Rou.ng Reading: Sec.ons 4.2 and 4.3.4 Link State Rou.ng Reading: Sec.ons. and.. COS 6: Computer Networks Spring 009 (MW :0 :50 in COS 05) Michael Freedman Teaching Assistants: WyaN Lloyd and Jeff Terrace hnp://www.cs.princeton.edu/courses/archive/spring09/cos6/

More information

Improving QOS in IP Networks. Principles for QOS Guarantees

Improving QOS in IP Networks. Principles for QOS Guarantees Improving QOS in IP Networks Thus far: making the best of best effort Future: next generation Internet with QoS guarantees RSVP: signaling for resource reservations Differentiated Services: differential

More information

EP2210 Scheduling. Lecture material:

EP2210 Scheduling. Lecture material: EP2210 Scheduling Lecture material: Bertsekas, Gallager, 6.1.2. MIT OpenCourseWare, 6.829 A. Parekh, R. Gallager, A generalized Processor Sharing Approach to Flow Control - The Single Node Case, IEEE Infocom

More information

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service CSCD 433/533 Advanced Networks Spring 2016 Lecture 22 Quality of Service 1 Topics Quality of Service (QOS) Defined Properties Integrated Service Differentiated Service 2 Introduction Problem Overview Have

More information

Routing in packet-switching networks

Routing in packet-switching networks Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call

More information

Bandwidth Allocation & TCP

Bandwidth Allocation & TCP Bandwidth Allocation & TCP The Transport Layer Focus Application Presentation How do we share bandwidth? Session Topics Transport Network Congestion control & fairness Data Link TCP Additive Increase/Multiplicative

More information

William Stallings Data and Computer Communications 7 th Edition. Chapter 12 Routing

William Stallings Data and Computer Communications 7 th Edition. Chapter 12 Routing William Stallings Data and Computer Communications 7 th Edition Chapter 12 Routing Routing in Circuit Switched Network Many connections will need paths through more than one switch Need to find a route

More information

QoS Policy Parameters

QoS Policy Parameters CHAPTER 6 This chapter describes the parameters, both required and optional, for QoS provisioning using the ISC user interface. Service level QoS parameters include all entry fields in the VoIP, Management,

More information

Computer Networks. Course Reference Model. Topic. Congestion What s the hold up? Nature of Congestion. Nature of Congestion 1/5/2015.

Computer Networks. Course Reference Model. Topic. Congestion What s the hold up? Nature of Congestion. Nature of Congestion 1/5/2015. Course Reference Model Computer Networks 7 Application Provides functions needed by users Zhang, Xinyu Fall 204 4 Transport Provides end-to-end delivery 3 Network Sends packets over multiple links School

More information

Introduction to IP QoS

Introduction to IP QoS Introduction to IP QoS Primer to IP Quality of Service Aspects Queuing, Shaping, Classification Agenda IP QoS Introduction Queue Management Congestion Avoidance Traffic Rate Management Classification and

More information

Chapter 12. Routing and Routing Protocols 12-1

Chapter 12. Routing and Routing Protocols 12-1 Chapter 12 Routing and Routing Protocols 12-1 Routing in Circuit Switched Network Many connections will need paths through more than one switch Need to find a route Efficiency Resilience Public telephone

More information

CS321: Computer Networks Congestion Control in TCP

CS321: Computer Networks Congestion Control in TCP CS321: Computer Networks Congestion Control in TCP Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Causes and Cost of Congestion Scenario-1: Two Senders, a

More information

Real-Time Protocol (RTP)

Real-Time Protocol (RTP) Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of

More information

Data Communication Networks Final

Data Communication Networks Final Data Communication Networks Final Saad Mneimneh Visiting Professor Hunter College of CUNY NAME: This final test is take home... There are 8 Problems (but each problem has multiple parts, possibly on separate

More information

Congestion Control 3/16/09

Congestion Control 3/16/09 Congestion Control Outline Resource Allocation Queuing TCP Congestion Control Spring 009 CSE3064 Issues Two sides of the same coin pre-allocate resources so at to avoid congestion control congestion if

More information

Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION

Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION Chapter 6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION 6.1 Introduction Supporting Quality of Service

More information

Lesson 14: QoS in IP Networks: IntServ and DiffServ

Lesson 14: QoS in IP Networks: IntServ and DiffServ Slide supporting material Lesson 14: QoS in IP Networks: IntServ and DiffServ Giovanni Giambene Queuing Theory and Telecommunications: Networks and Applications 2nd edition, Springer All rights reserved

More information

Kent State University

Kent State University CS 4/54201 Computer Communication Network Kent State University Dept. of Computer Science www.mcs.kent.edu/~javed/class-net06f/ 1 A Course on Networking and Computer Communication LECT-11, S-2 Congestion

More information

CS 457 Networking and the Internet. Shortest-Path Problem. Dijkstra s Shortest-Path Algorithm 9/29/16. Fall 2016

CS 457 Networking and the Internet. Shortest-Path Problem. Dijkstra s Shortest-Path Algorithm 9/29/16. Fall 2016 9/9/6 S 7 Networking and the Internet Fall 06 Shortest-Path Problem Given: network topology with link costs c(x,y): link cost from node x to node y Infinity if x and y are not direct neighbors ompute:

More information

Congestion Control in TCP

Congestion Control in TCP Congestion Control in TCP Antonio Carzaniga Faculty of Informatics University of Lugano May 6, 2005 Outline Intro to congestion control Input rate vs. output throughput Congestion window Congestion avoidance

More information

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste Outline 15-441 Computer Networking Lecture 18 TCP Performance Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 TCP congestion avoidance TCP slow start TCP modeling TCP details 2 AIMD Distributed,

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

Routing, Routers, Switching Fabrics

Routing, Routers, Switching Fabrics Routing, Routers, Switching Fabrics Outline Link state routing Link weights Router Design / Switching Fabrics CS 640 1 Link State Routing Summary One of the oldest algorithm for routing Finds SP by developing

More information

Lecture 14: Performance Architecture

Lecture 14: Performance Architecture Lecture 14: Performance Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 14-1 Background Performance: levels for capacity, delay, and RMA. Performance

More information

Configuring QoS CHAPTER

Configuring QoS CHAPTER CHAPTER 34 This chapter describes how to use different methods to configure quality of service (QoS) on the Catalyst 3750 Metro switch. With QoS, you can provide preferential treatment to certain types

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (  1 RATE CONTROL SCHEME IN DATA NETWORK Joy Eneh 1, Harris Orah 2 1 Department of Electrical and Electronic Engineering, Nnamdi Azikiwe University Awka, Anambra state, Nigeria. 2 Department of Electronic Engineering,

More information

UNIT 2 TRANSPORT LAYER

UNIT 2 TRANSPORT LAYER Network, Transport and Application UNIT 2 TRANSPORT LAYER Structure Page No. 2.0 Introduction 34 2.1 Objective 34 2.2 Addressing 35 2.3 Reliable delivery 35 2.4 Flow control 38 2.5 Connection Management

More information

CS244 Advanced Topics in Computer Networks Midterm Exam Monday, May 2, 2016 OPEN BOOK, OPEN NOTES, INTERNET OFF

CS244 Advanced Topics in Computer Networks Midterm Exam Monday, May 2, 2016 OPEN BOOK, OPEN NOTES, INTERNET OFF CS244 Advanced Topics in Computer Networks Midterm Exam Monday, May 2, 2016 OPEN BOOK, OPEN NOTES, INTERNET OFF Your Name: Answers SUNet ID: root @stanford.edu In accordance with both the letter and the

More information

TCP Congestion Control. Lecture 16. Outline. TCP Congestion Control. Additive Increase / Multiplicative Decrease (AIMD)

TCP Congestion Control. Lecture 16. Outline. TCP Congestion Control. Additive Increase / Multiplicative Decrease (AIMD) Lecture 16 TCP Congestion Control Homework 6 Due Today TCP uses ACK arrival as a signal to transmit a new packet. Since connections come-and-go TCP congestion control must be adaptive. TCP congestion control

More information

048866: Packet Switch Architectures

048866: Packet Switch Architectures 048866: Packet Switch Architectures Output-Queued Switches Deterministic Queueing Analysis Fairness and Delay Guarantees Dr. Isaac Keslassy Electrical Engineering, Technion isaac@ee.technion.ac.il http://comnet.technion.ac.il/~isaac/

More information

CS 349/449 Internet Protocols Final Exam Winter /15/2003. Name: Course:

CS 349/449 Internet Protocols Final Exam Winter /15/2003. Name: Course: CS 349/449 Internet Protocols Final Exam Winter 2003 12/15/2003 Name: Course: Instructions: 1. You have 2 hours to finish 2. Question 9 is only for 449 students 3. Closed books, closed notes. Write all

More information